From 9591143630374a6ae97439c9d909e0f003e5fef8 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 6 Sep 2023 16:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/36xxx/CVE-2020-36130.json | 5 +++++ 2020/36xxx/CVE-2020-36131.json | 5 +++++ 2020/36xxx/CVE-2020-36133.json | 5 +++++ 2020/36xxx/CVE-2020-36135.json | 5 +++++ 2021/30xxx/CVE-2021-30473.json | 5 +++++ 2021/30xxx/CVE-2021-30474.json | 5 +++++ 2021/30xxx/CVE-2021-30475.json | 5 +++++ 2022/34xxx/CVE-2022-34038.json | 17 ++++++++++++++++- 2023/38xxx/CVE-2023-38255.json | 18 ++++++++++++++++++ 2023/38xxx/CVE-2023-38582.json | 18 ++++++++++++++++++ 2023/39xxx/CVE-2023-39446.json | 18 ++++++++++++++++++ 2023/39xxx/CVE-2023-39452.json | 18 ++++++++++++++++++ 2023/40xxx/CVE-2023-40221.json | 18 ++++++++++++++++++ 2023/41xxx/CVE-2023-41084.json | 18 ++++++++++++++++++ 2023/41xxx/CVE-2023-41958.json | 18 ++++++++++++++++++ 2023/41xxx/CVE-2023-41965.json | 18 ++++++++++++++++++ 2023/4xxx/CVE-2023-4801.json | 18 ++++++++++++++++++ 2023/4xxx/CVE-2023-4802.json | 18 ++++++++++++++++++ 2023/4xxx/CVE-2023-4803.json | 18 ++++++++++++++++++ 2023/4xxx/CVE-2023-4804.json | 18 ++++++++++++++++++ 20 files changed, 267 insertions(+), 1 deletion(-) create mode 100644 2023/38xxx/CVE-2023-38255.json create mode 100644 2023/38xxx/CVE-2023-38582.json create mode 100644 2023/39xxx/CVE-2023-39446.json create mode 100644 2023/39xxx/CVE-2023-39452.json create mode 100644 2023/40xxx/CVE-2023-40221.json create mode 100644 2023/41xxx/CVE-2023-41084.json create mode 100644 2023/41xxx/CVE-2023-41958.json create mode 100644 2023/41xxx/CVE-2023-41965.json create mode 100644 2023/4xxx/CVE-2023-4801.json create mode 100644 2023/4xxx/CVE-2023-4802.json create mode 100644 2023/4xxx/CVE-2023-4803.json create mode 100644 2023/4xxx/CVE-2023-4804.json diff --git a/2020/36xxx/CVE-2020-36130.json b/2020/36xxx/CVE-2020-36130.json index 76bde401ccc..831ba8e10d3 100644 --- a/2020/36xxx/CVE-2020-36130.json +++ b/2020/36xxx/CVE-2020-36130.json @@ -61,6 +61,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230905 [SECURITY] [DLA 3556-1] aom security update", "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00003.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5490", + "url": "https://www.debian.org/security/2023/dsa-5490" } ] } diff --git a/2020/36xxx/CVE-2020-36131.json b/2020/36xxx/CVE-2020-36131.json index 0df5f7e4120..f4f19d5fc88 100644 --- a/2020/36xxx/CVE-2020-36131.json +++ b/2020/36xxx/CVE-2020-36131.json @@ -61,6 +61,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230905 [SECURITY] [DLA 3556-1] aom security update", "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00003.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5490", + "url": "https://www.debian.org/security/2023/dsa-5490" } ] } diff --git a/2020/36xxx/CVE-2020-36133.json b/2020/36xxx/CVE-2020-36133.json index 23754634dcc..443ecf4dbc9 100644 --- a/2020/36xxx/CVE-2020-36133.json +++ b/2020/36xxx/CVE-2020-36133.json @@ -61,6 +61,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230905 [SECURITY] [DLA 3556-1] aom security update", "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00003.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5490", + "url": "https://www.debian.org/security/2023/dsa-5490" } ] } diff --git a/2020/36xxx/CVE-2020-36135.json b/2020/36xxx/CVE-2020-36135.json index 871865f20b3..7b692cf3d4f 100644 --- a/2020/36xxx/CVE-2020-36135.json +++ b/2020/36xxx/CVE-2020-36135.json @@ -61,6 +61,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230905 [SECURITY] [DLA 3556-1] aom security update", "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00003.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5490", + "url": "https://www.debian.org/security/2023/dsa-5490" } ] } diff --git a/2021/30xxx/CVE-2021-30473.json b/2021/30xxx/CVE-2021-30473.json index d83409f59ff..55f898b5599 100644 --- a/2021/30xxx/CVE-2021-30473.json +++ b/2021/30xxx/CVE-2021-30473.json @@ -71,6 +71,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230905 [SECURITY] [DLA 3556-1] aom security update", "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00003.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5490", + "url": "https://www.debian.org/security/2023/dsa-5490" } ] } diff --git a/2021/30xxx/CVE-2021-30474.json b/2021/30xxx/CVE-2021-30474.json index 3080c631ebc..03b12d19045 100644 --- a/2021/30xxx/CVE-2021-30474.json +++ b/2021/30xxx/CVE-2021-30474.json @@ -66,6 +66,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230905 [SECURITY] [DLA 3556-1] aom security update", "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00003.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5490", + "url": "https://www.debian.org/security/2023/dsa-5490" } ] } diff --git a/2021/30xxx/CVE-2021-30475.json b/2021/30xxx/CVE-2021-30475.json index 2fe0c6de50c..2c2da12aa94 100644 --- a/2021/30xxx/CVE-2021-30475.json +++ b/2021/30xxx/CVE-2021-30475.json @@ -71,6 +71,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20230905 [SECURITY] [DLA 3556-1] aom security update", "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00003.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-5490", + "url": "https://www.debian.org/security/2023/dsa-5490" } ] } diff --git a/2022/34xxx/CVE-2022-34038.json b/2022/34xxx/CVE-2022-34038.json index c3a927a8078..0dd2e5a0ddf 100644 --- a/2022/34xxx/CVE-2022-34038.json +++ b/2022/34xxx/CVE-2022-34038.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Etcd v3.5.4 allows remote attackers to cause a denial of service via function PageWriter.write in pagewriter.go" + "value": "** DISPUTED ** Etcd v3.5.4 allows remote attackers to cause a denial of service via function PageWriter.write in pagewriter.go. NOTE: the vendor's position is that this is not a vulnerability." } ] }, @@ -61,6 +61,21 @@ "refsource": "MISC", "name": "https://github.com/etcd-io/etcd/pull/14452", "url": "https://github.com/etcd-io/etcd/pull/14452" + }, + { + "refsource": "MISC", + "name": "https://github.com/golang/vulndb/issues/2016#issuecomment-1698677762", + "url": "https://github.com/golang/vulndb/issues/2016#issuecomment-1698677762" + }, + { + "refsource": "MISC", + "name": "https://go-review.googlesource.com/c/vulndb/+/524456", + "url": "https://go-review.googlesource.com/c/vulndb/+/524456" + }, + { + "refsource": "MISC", + "name": "https://go-review.googlesource.com/c/vulndb/+/524456/2/data/excluded/GO-2023-2016.yaml", + "url": "https://go-review.googlesource.com/c/vulndb/+/524456/2/data/excluded/GO-2023-2016.yaml" } ] } diff --git a/2023/38xxx/CVE-2023-38255.json b/2023/38xxx/CVE-2023-38255.json new file mode 100644 index 00000000000..66994500aa4 --- /dev/null +++ b/2023/38xxx/CVE-2023-38255.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-38255", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/38xxx/CVE-2023-38582.json b/2023/38xxx/CVE-2023-38582.json new file mode 100644 index 00000000000..b71098bffdc --- /dev/null +++ b/2023/38xxx/CVE-2023-38582.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-38582", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39446.json b/2023/39xxx/CVE-2023-39446.json new file mode 100644 index 00000000000..190d7238990 --- /dev/null +++ b/2023/39xxx/CVE-2023-39446.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39446", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/39xxx/CVE-2023-39452.json b/2023/39xxx/CVE-2023-39452.json new file mode 100644 index 00000000000..291cffbcf28 --- /dev/null +++ b/2023/39xxx/CVE-2023-39452.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-39452", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/40xxx/CVE-2023-40221.json b/2023/40xxx/CVE-2023-40221.json new file mode 100644 index 00000000000..f6214cce254 --- /dev/null +++ b/2023/40xxx/CVE-2023-40221.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-40221", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/41xxx/CVE-2023-41084.json b/2023/41xxx/CVE-2023-41084.json new file mode 100644 index 00000000000..0f4ac68d252 --- /dev/null +++ b/2023/41xxx/CVE-2023-41084.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-41084", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/41xxx/CVE-2023-41958.json b/2023/41xxx/CVE-2023-41958.json new file mode 100644 index 00000000000..80b0dd1f03d --- /dev/null +++ b/2023/41xxx/CVE-2023-41958.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-41958", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/41xxx/CVE-2023-41965.json b/2023/41xxx/CVE-2023-41965.json new file mode 100644 index 00000000000..93df174ea69 --- /dev/null +++ b/2023/41xxx/CVE-2023-41965.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-41965", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/4xxx/CVE-2023-4801.json b/2023/4xxx/CVE-2023-4801.json new file mode 100644 index 00000000000..bc473c16159 --- /dev/null +++ b/2023/4xxx/CVE-2023-4801.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-4801", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/4xxx/CVE-2023-4802.json b/2023/4xxx/CVE-2023-4802.json new file mode 100644 index 00000000000..fd041e73ace --- /dev/null +++ b/2023/4xxx/CVE-2023-4802.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-4802", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/4xxx/CVE-2023-4803.json b/2023/4xxx/CVE-2023-4803.json new file mode 100644 index 00000000000..da5c4fb157c --- /dev/null +++ b/2023/4xxx/CVE-2023-4803.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-4803", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/4xxx/CVE-2023-4804.json b/2023/4xxx/CVE-2023-4804.json new file mode 100644 index 00000000000..c3e7a2f9c76 --- /dev/null +++ b/2023/4xxx/CVE-2023-4804.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-4804", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file